Search Results - different ((((encryption algorithm) OR (detection algorithm))) OR (evolutionary algorithm))
Search alternatives:
- evolutionary »
-
1
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
2
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
3
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
4
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
Get full text
Get full text
Conference or Workshop Item -
5
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
6
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…The objectives of this study are to pre-process the scanned images and apply the image recognition algorithm for lane detection. The study employed Canny Edge Detection and Hough Transform algorithms on several sets of images. …”
Get full text
Get full text
Get full text
Article -
7
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…LPHA proves to be an efficient edge detector evaluation algorithm and FPSO is proven to be an effective edge detection algorithm.…”
Get full text
Get full text
Thesis -
8
-
9
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item -
10
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…To overcome the aforementioned issues, in this research proposed anomaly based detection is designed with Evolutionary Neural Network (ENN) by three different detection methods. …”
Get full text
Get full text
Thesis -
13
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…In this paper CSA is used to cryptanalyse a simple substitution cipher, whereby the key used to encrypt the plaintext is searched. The algorithm is based on the Clonalg algorithm developed by de Castro and Von Zuben. …”
Get full text
Get full text
Conference or Workshop Item -
14
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
Evolutionary Fuzzy ARTMAP Neural Networks for Classification of Semiconductor Defects
Published 2014“…In particular, both the FAM models and hybrid genetic algorithms are integrated in the proposed evolutionary artificial neural networks (EANNs) to classify an imbalanced data set. …”
Get full text
Get full text
Get full text
Article -
16
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…The study proposes a multi-view ensemble algorithm to integrate predicted values of different motion sensors. …”
Get full text
Get full text
Article -
17
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Then the results are compared to the average energy dissipation (μJ) by applying different encryption data, AES, SF and SIT algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
19
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…Proposed algorithm AES, has a different key sizes ,as 128,192 and 256. …”
Get full text
Get full text
Thesis -
20
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…These evolutionary-based algorithms are known to be effective in solving optimization problems. …”
Get full text
Get full text
Article
